default search action
Suman Roy 0001
Person information
- affiliation: Optum Global Solutions Ltd (UnitedHealth Group)
- affiliation: Infosys Ltd., Bangalore, India
- affiliation: Honeywell Technology Solutions Lab, Bangalore, India
- affiliation: Indian Institute of Science (IISc), Bangalore, India
Other persons with the same name
- Suman Roy 0002 — IIT Guwahati, India
- Suman Roy 0003 — Calcutta Institute of Engineering and Management, Department of Physics, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]Amit Kumar, Souparna Das, Suman Roy:
Transfer Learning Improves Unsupervised Assignment of ICD codes with Clinical Notes. ICDH 2023: 278-287 - [c48]Vijay Varma Malladi, Suman Roy:
Call Reason Prediction using Hierarchical Models. SAC 2023: 898-901 - 2022
- [c47]Amit Kumar, Suman Roy, Sourabh Kumar Bhattacharjee:
A fast unsupervised assignment of ICD codes with clinical notes through explanations. SAC 2022: 610-618 - 2021
- [j9]Ayan Sengupta, Suman Roy, Gaurav Ranjan:
LJST: A Semi-supervised Joint Sentiment-Topic Model for Short Texts. SN Comput. Sci. 2(4): 256 (2021) - [c46]Ayan Sengupta, Amit Kumar, Sourabh Kumar Bhattacharjee, Suman Roy:
Gated Transformer for Robust De-noised Sequence-to-Sequence Modelling. EMNLP (Findings) 2021: 3645-3657 - [c45]Suman Roy, Amit Kumar, Ayan Sengupta, Riccardo Mattivi, Selim Ahmed, Michael Bridges:
An Embedded Representation Learning of Relational Clinical Codes. ICSOC 2021: 885-899 - [c44]Ayan Sengupta, William Scott Paka, Suman Roy, Gaurav Ranjan, Tanmoy Chakraborty:
An Embedding-based Joint Sentiment-Topic Model for Short Texts. ICWSM 2021: 633-643 - [i4]Ayan Sengupta, William Scott Paka, Suman Roy, Gaurav Ranjan, Tanmoy Chakraborty:
An Embedding-based Joint Sentiment-Topic Model for Short Texts. CoRR abs/2103.14410 (2021) - 2020
- [c43]Shashi Kumar, Suman Roy, Vishal Pathak:
A Hybrid Distributed Model for Learning Representation of Short Texts with Attribute Labels. COMAD/CODS 2020: 244-248 - [c42]Suman Roy, Vijay Varma Malladi, Ayan Sengupta, Souparna Das:
Online Topic Modeling for Short Texts. ICSOC 2020: 563-579
2010 – 2019
- 2018
- [c41]Vrinda Yadav, Suman Roy, Rushikesh K. Joshi:
Patterns for Process Edification in Process-Aware Information Systems. SCC 2018: 161-168 - [c40]Suman Roy, Vijay Varma Malladi, Abhishek Gangwar, Rajaprabu Dharmaraj:
A NMF-Based Learning of Topics and Clusters for IT Maintenance Tickets Aided by Heuristic. CAiSE Forum 2018: 209-217 - [c39]Suman Roy, Gabriel Silvatici Dayan, V. Devaraja Holla:
Modeling Industrial Business Processes for Querying and Retrieving Using OWL+SWRL. OTM Conferences (2) 2018: 516-536 - 2017
- [c38]Durga Prasad Muni, Suman Roy, Yeung Tack Yan John John Lew Chiang, Antoine Jean-Marie Viallet, Navin Budhiraja:
Recommending resolutions of ITIL services tickets using Deep Neural Network. CODS 2017: 14:1-14:10 - [c37]Metta Santiputri, Aditya Ghose, Hoa Khanh Dam, Suman Roy:
Goal Orchestrations: Modelling and Mining Flexible Business Processes. ER 2017: 373-387 - [c36]Suman Roy, Durga Prasad Muni, Adrija Bhattacharya, Dipanjan Dutta, Navin Budhiraja:
Fuzzy QoS Modeling of IT Maintenance Tickets. ICWS 2017: 476-483 - [c35]Raghav Sonavane, Suman Roy, Durga Prasad Muni:
Boosting Aided Approaches to QoS Prediction of IT Maintenance Tickets. OTM Conferences (1) 2017: 467-487 - 2016
- [j8]Indranil Saha, Suman Roy, S. Ramesh:
Formal Verification of Fault-Tolerant Startup Algorithms for Time-Triggered Architectures: A Survey. Proc. IEEE 104(5): 904-922 (2016) - [j7]Suman Roy, Janardan Misra, Indranil Saha:
A simplification of a real-time verification problem. Softw. Test. Verification Reliab. 26(8): 548-571 (2016) - [j6]Suman Roy, A. S. M. Sajeev:
A Formal Framework for Diagnostic Analysis for Errors of Business Processes. Trans. Petri Nets Other Model. Concurr. 11: 226-261 (2016) - [c34]Suman Roy, A. S. M. Sajeev, A. Gopichand, Adrija Bhattacharya:
An Empirical Analysis of Diagnosis of Industrial Business Processes at Sub-process Levels. SCC 2016: 195-202 - [c33]Suman Roy, John-John Yeung Tack Yan, Navin Budhiraja, Aeran Lim:
Recovering Resolutions for Application Maintenance Incidents. SCC 2016: 617-624 - [c32]Suman Roy, Metta Santiputri, Aditya K. Ghose:
Annotating and Mining for Effects of Processes. ER 2016: 302-310 - [c31]Suman Roy, Durga Prasad Muni, John-John Yeung Tack Yan, Navin Budhiraja, Fabien Ceiler:
Clustering and Labeling IT Maintenance Tickets. ICSOC 2016: 829-845 - 2015
- [c30]Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy:
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. ICISS 2015: 562-572 - [c29]Suman Roy, Kiran Prakash Sawant, Aditya Kale, Olivier Maurice Charvin:
Extraction of Topic Map Ontology for Web Service-Oriented Enterprises. ICSOC Workshops 2015: 117-129 - 2014
- [j5]Janardan Misra, Suman Roy:
A decidable timeout-based extension of linear temporal logic. J. Appl. Non Class. Logics 24(3): 262-291 (2014) - [j4]Suman Roy, A. S. M. Sajeev, Sidharth Bihary, Abhishek Ranjan:
An Empirical Study of Error Patterns in Industrial Business Process Models. IEEE Trans. Serv. Comput. 7(2): 140-153 (2014) - [c28]Suman Roy, A. S. M. Sajeev, Srivibha Sripathy:
Diagnosing Industrial Business Processes: Early Experiences. FM 2014: 703-717 - [c27]Kiran Prakash Sawant, Suman Roy, Srivibha Sripathi, François Plesse, A. S. M. Sajeev:
Deriving requirements model from textual use cases. ICSE Companion 2014: 235-244 - [c26]Kiran Prakash Sawant, Suman Roy, Deepti Parachuri, François Plesse, Pushpak Bhattacharyya:
Enforcing structure on textual use cases via annotation models. ISEC 2014: 18:1-18:6 - 2013
- [c25]Suman Roy, Kiran Prakash Sawant, Olivier Maurice Charvin:
Generating topic maps from XML/XSD documents. COMPUTE 2013: 13:1-13:8 - 2012
- [c24]Suman Roy, Sidharth Bihary, Jose Alfonso Corso Laos:
A CSP-theoretic Framework of Checking Conformance of Business Processes. APSEC 2012: 30-39 - [c23]Sidharth Bihary, Suman Roy, Tan Zi Han, Kiran Prakash Sawant:
A knowledge-based formalization of UBL processes using hybrid programs. COMPUTE 2012: 13 - [c22]Suman Roy, Sidharth Bihary, Jose Alfonso Corso Laos:
A Conformance Checker Tool CSPConCheck. ICTAC 2012: 159-163 - [c21]Sidharth Bihary, Jagadish Koneti, Suman Roy:
Process conformance using CSP. ISEC 2012: 139-142 - [c20]Suman Roy, Wlodek Drabent:
Formalizing Business Process Using Hybrid Programs. OWLED 2012 - 2011
- [c19]Alberto Bastias, Sidharth Bihary, Suman Roy:
An Automated Analysis of Errors for BPM Processes Modeled Using an In-house Infosys Tool. APSEC 2011: 97-105 - [c18]Damien Lacoste, Kiran Prakash Sawant, Suman Roy:
An efficient XML to OWL converter. ISEC 2011: 145-154 - 2010
- [j3]Suman Roy:
A duration calculus with neighborhood modalities. J. Appl. Non Class. Logics 20(1-2): 81-126 (2010) - [c17]Suman Roy, Kiran Prakash Sawant, Aditya K. Ghose:
Ontology modeling of UBL process diagrams using OWL. CISIM 2010: 535-540 - [c16]Hui Wang, Suman Roy, Amitabha Das, Sanjoy Kumar Paul:
A framework for security quantification of networked machines. COMSNETS 2010: 1-8 - [i3]Indranil Saha, Janardan Misra, Suman Roy:
A Simplification of a Real-Time Verification Problem. CoRR abs/1008.1417 (2010) - [i2]Janardan Misra, Suman Roy:
A Decidable Timeout based Extension of Propositional Linear Temporal Logic. CoRR abs/1012.3704 (2010)
2000 – 2009
- 2009
- [c15]Faisal Karjikar, Suman Roy, Srinivas Padmanabhuni:
Intelligent business knowledge management using topic maps. Bangalore Compute Conf. 2009: 8 - [c14]Indranil Saha, Kuntal Chakraborty, Suman Roy, B. VishnuVardhan Reddy, Venkatappaiah Kurapati, Vishesh Sharma:
An approach to reverse engineering of C programs to simulink models with conformance testing. ISEC 2009: 137-138 - [i1]Janardan Misra, Suman Roy:
Techniques for Distributed Reachability Analysis with Partial Order and Symmetry based Reductions. CoRR abs/0901.0179 (2009) - 2007
- [c13]Indranil Saha, Janardan Misra, Suman Roy:
Timeout and Calendar Based Finite State Modeling and Verification of Real-Time Systems. ATVA 2007: 284-299 - [c12]Dungara Ram Choudhary, Dev Anshul, Suman Roy, Chandrashekhar Thejaswi P. S.:
Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks. COMSWARE 2007 - [c11]Indranil Saha, Suman Roy:
A Finite State Analysis of Time-Triggered CAN (TTCAN) Protocol Using Spin. ICCTA 2007: 77-81 - [c10]Indranil Saha, Suman Roy, Kuntal Chakraborty:
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar. SEFM 2007: 69-79 - [c9]Suman Roy, Guido Sciavicco:
Reasoning with 'And Then' and 'While'. TIME 2007: 181-188 - 2006
- [c8]Suman Roy, Debapriyay Mukhopadhyay, Chandrashekhar Thejaswi P. S.:
A Sensor network design from a probabilistic automaton model of impersonation attack. COMSWARE 2006: 1-7 - [c7]Indranil Saha, Suman Roy:
A Finite State Modeling of AFDX Frame Management Using Spin. FMICS/PDMC 2006: 227-243 - [c6]Suman Roy, Bhaskar Chakraborty:
A Finite Union of DFAs in Symbolic Model Checking of Infinite Systems. CIAA 2006: 277-278 - 2005
- [c5]Debapriyay Mukhopadhyay, Suman Roy:
A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network. ICDCIT 2005: 334-347 - [c4]Dev Anshul, Suman Roy:
A ZKP-based identification scheme for base nodes in wireless sensor networks. SAC 2005: 319-323 - 2004
- [c3]Suman Roy:
Symbolic Verification of Infinite Systems using a Finite Union of DFAs. SEFM 2004: 56-66 - 2000
- [j2]Rana Barua, Suman Roy, Chaochen Zhou:
Completeness of neighbourhood logic. J. Log. Comput. 10(2): 271-295 (2000)
1990 – 1999
- 1999
- [c2]Rana Barua, Suman Roy, Zhou Chaochen:
Completeness of Neighbourhood Logic. STACS 1999: 521-530 - 1998
- [j1]Vijay Chandru, Suman Roy, Ramesh Subrahmanyam:
Negation as Failure as Resolution. Constraints An Int. J. 3(4): 315-329 (1998) - 1996
- [c1]Vijay Chandru, Suman Roy, Ramesh Subrahmanyam:
Constructive Negation in Definite Constraint Logic Programs. ASIAN 1996: 335-336
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 17:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint